1 posted on
01/15/2004 6:14:14 PM PST by
lizma
To: lizma
Those evil SUVs again:')
2 posted on
01/15/2004 6:16:48 PM PST by
CindyDawg
To: lizma
What else should I do? Carry a digital camera in the future so you can get pictures of people and license plates. Some people will object. Carry a Glock too.
3 posted on
01/15/2004 6:17:26 PM PST by
AdamSelene235
(I always shoot for the moon......sometimes I hit London.- Von Braun)
To: lizma
You'd have to have a pretty fast connection to find and download all that. Most likely they were just lily padding.
4 posted on
01/15/2004 6:17:42 PM PST by
js1138
To: lizma
Looks like you've got a good start, i.e. changing account info. Otherwise look for naked lady mud flap purchases on your credit card statements.
To: lizma
It's called 'wardriving.' They don't want your documents, they want access to the internet via your IP address and WiFi network.
Someone will come along here and tell you how to lock it down tight, but if all else fails, check out www.techtv.com/screensavers.
6 posted on
01/15/2004 6:20:13 PM PST by
Petronski
(I'm *NOT* always *CRANKY.*)
To: lizma
If you had your network setup to accept only connections from machines with you MAC address then it's doubtful they hacked into your system. If they got your MAC then they probably would have had gotten physcial access to your pc. Unless there is some program that dupes MAC addresses somehow.
7 posted on
01/15/2004 6:20:48 PM PST by
DouglasKC
To: lizma
Argh. Sorry to hear about this. Call all three credit bureaus immediately, and ask for a notation on your credit report that you may be a victim of identify theft. That way, if these people try to open new accounts under your SS#, it will be red-flagged. I've never had to do this, but do know that the credit bureau people can be really helpful.
Good luck!
9 posted on
01/15/2004 6:23:15 PM PST by
bootless
(Never Forget)
To: lizma
I'd say there is a good chance you are totally and completely compromised. I would immediately notify your credit card companies (STOP READING AND PICK UP THE PHONE, NOW!!!!).
OK, now that you've canceled them all, let your bank know (again, right now if there is a 24 hour phone number). Secure the daylights out of your network. Using a dial-up connection and a borrowed computer, change your passwords using random ones (remember, your personal data was compromised so they have clues to crack your mnemonic-based schemes). Copy only data files that you need to save to a CD and then reformat your hard drive and reinstall from original CD's, not backups. If you were thinking of buying a new computer, maybe now is the time assuming you have any money left.
10 posted on
01/15/2004 6:24:28 PM PST by
NonValueAdded
("Either you are with us, or you are with the terrorists." GWB 9/20/01)
To: lizma
Excellent question concerning wireless security. I know when I set up my wireless LAN I was all concerned about security but now that I think about it I don't believe I did anything too special to prevent intrusion via the wireless access.
I've adequate protection (I think) for preventing intrusion from the internet. Like hardware and sortware firewalls but I'm sure there is much more that can be done.
I do not keep any financial or personal data on my pc's but my wife has reports on the pc's that contain confidential information about others.
Any advice from knowledgable FReepers is appreciated.
11 posted on
01/15/2004 6:24:44 PM PST by
PFKEY
To: lizma
Well, not to dismiss your fears, they're certainly justified considering what information you had available, but in all liklihood, this is nothing to to concerned about.
Most likely, they simply found that you had an open wireless network and were freeloading your internet and nothing more. This is far more common than you would believe.
In the meantime, start using WEP. That's what it's there for.
12 posted on
01/15/2004 6:26:40 PM PST by
tdadams
To: lizma
You should also give your system a security "health check". Use the ShieldsUp feature at
Gibson Research.
17 posted on
01/15/2004 6:44:57 PM PST by
tdadams
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson